Trustworthy indication of software integrity

    公开(公告)号:US10354075B1

    公开(公告)日:2019-07-16

    申请号:US15638867

    申请日:2017-06-30

    Abstract: Computing devices are disclosed that include functionality for providing a trustworthy indication of software integrity. The computing devices include a hardware trust evaluation device capable of determining the trustworthiness of computer programs executing on the devices. At least one trust indicator is also connected to the hardware trust evaluation device for providing an external indication of the trustworthiness of a computer program. Additional security information regarding the trustworthiness of the computer program may be displayed on the primary display device of the computing device. The display of the security information is triggered by a user of the computing device submitting a request through a secure mechanism, where the request is unobservable and inaccessible to programs executing on the computing device. Additional secure mechanisms, such as a unique user interface for displaying the security information, can be utilized to ensure the authenticity of the displayed security information.

    Authenticated communication between devices

    公开(公告)号:US10129228B1

    公开(公告)日:2018-11-13

    申请号:US15085777

    申请日:2016-03-30

    Abstract: Various examples are directed to systems and methods for establishing a secure, authenticated connection between devices utilizing a password authenticated key exchange. A client may send an encrypted connection request message to a server via a first communication medium. The server may send the client first data token data via a first communication medium. The client may encrypt the first data token with a password-authenticated key, for example, obtained in a password authenticated key exchange with the server. The client may encrypt the first token data based at least in part on the password-authenticated key to generate a message authentication code (MAC). The client may send the MAC to the server.

    DYNAMIC UNLOCK MECHANISMS FOR MOBILE DEVICES
    39.
    发明申请
    DYNAMIC UNLOCK MECHANISMS FOR MOBILE DEVICES 有权
    移动设备动态解锁机制

    公开(公告)号:US20170064555A1

    公开(公告)日:2017-03-02

    申请号:US15349874

    申请日:2016-11-11

    Abstract: An access control application for mobile devices is provided. The access control application may be configured to generate a set of security tasks based at least in part on information corresponding to a user's interactions with the mobile device. An unlock screen of the mobile device may be triggered and a security tasks from the generated set of security tasks may be displayed through a user interface of the mobile device. The user's response to the security tasks may be obtained and a confidence score may be calculated, based at least in part on the response. The access control application may then determine, based at least in part on the score and one or more attributes of the environment, whether to unlock the mobile device or prompt the user to provide an additional response to another security task.

    Abstract translation: 提供了用于移动设备的访问控制应用。 访问控制应用可以被配置为至少部分地基于与用户与移动设备的交互相对应的信息来生成一组安全任务。 可以触发移动设备的解锁屏幕,并且可以通过移动设备的用户界面显示来自生成的一组安全任务的安全任务。 可以至少部分地基于响应来获得用户对安全任务的响应并且可以计算可信度得分。 访问控制应用程序可以至少部分地基于环境的得分和一个或多个属性来确定是解锁移动设备还是提示用户向另一个安全任务提供额外的响应。

    Countermeasures for threats to an uncrewed autonomous vehicle
    40.
    发明授权
    Countermeasures for threats to an uncrewed autonomous vehicle 有权
    对未知的自主车辆的威胁的对策

    公开(公告)号:US09524648B1

    公开(公告)日:2016-12-20

    申请号:US14543198

    申请日:2014-11-17

    Abstract: Uncrewed autonomous vehicles (“UAVs”) may navigate from one location to another location. Described herein are systems, devices, and methods providing countermeasures for threats that may compromise the UAVs. A plurality of UAVs may establish a mesh network to distribute information to one another. A first UAV may receive external data from a second UAV using the mesh network. The external data may be used to confirm or cross-check data such as location, heading, altitude, and so forth. Disagreement between data generated by the first UAV with external data from the second UAV may result in the determination that the first UAV is compromised. Remedial actions may be taken, such as the first UAV may be directed to a safe location to land or park, may receive commands from another UAV, and so forth.

    Abstract translation: 未开采的自主车辆(“UAV”)可以从一个位置导航到另一个位置。 这里描述了为可能危及无人机的威胁提供对策的系统,设备和方法。 多个UAV可以建立网状网络以将信息彼此分配。 第一UAV可以使用网状网络从第二UAV接收外部数据。 外部数据可用于确认或交叉检查数据,如位置,航向,高度等。 由第一UAV与第二UAV的外部数据产生的数据之间的不一致可能导致第一UAV被确认。 可以采取补救措施,例如可以将第一UAV引导到安全的地点着陆或停放,可以从另一UAV接收命令等等。

Patent Agency Ranking